-
Notifications
You must be signed in to change notification settings - Fork 612
[New Rule] Adding Coverage for AWS SSM Command Document Created by Rare User
#4229
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Merged
terrancedejesus
merged 10 commits into
main
from
new-rule-aws-ssm-command-document-creation
Nov 6, 2024
Merged
[New Rule] Adding Coverage for AWS SSM Command Document Created by Rare User
#4229
terrancedejesus
merged 10 commits into
main
from
new-rule-aws-ssm-command-document-creation
Nov 6, 2024
Conversation
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Collaborator
Rule: New - GuidelinesThese guidelines serve as a reminder set of considerations when proposing a new rule. Documentation and Context
Rule Metadata Checks
New BBR Rules
Testing and Validation
|
terrancedejesus
commented
Nov 1, 2024
rules/integrations/aws/execution_ssm_command_document_created_by_rare_user.toml
Outdated
Show resolved
Hide resolved
…by_rare_user.toml
Aegrah
approved these changes
Nov 4, 2024
imays11
reviewed
Nov 5, 2024
rules/integrations/aws/execution_ssm_command_document_created_by_rare_user.toml
Show resolved
Hide resolved
shashank-elastic
approved these changes
Nov 6, 2024
imays11
approved these changes
Nov 6, 2024
Sign up for free
to join this conversation on GitHub.
Already have an account?
Sign in to comment
Labels
backport: auto
Domain: Cloud Workloads
Integration: AWS
AWS related rules
Rule: New
Proposal for new rule
Add this suggestion to a batch that can be applied as a single commit.
This suggestion is invalid because no changes were made to the code.
Suggestions cannot be applied while the pull request is closed.
Suggestions cannot be applied while viewing a subset of changes.
Only one suggestion per line can be applied in a batch.
Add this suggestion to a batch that can be applied as a single commit.
Applying suggestions on deleted lines is not supported.
You must change the existing code in this line in order to create a valid suggestion.
Outdated suggestions cannot be applied.
This suggestion has been applied or marked resolved.
Suggestions cannot be applied from pending reviews.
Suggestions cannot be applied on multi-line comments.
Suggestions cannot be applied while the pull request is queued to merge.
Suggestion cannot be applied right now. Please check back later.
Pull Request
Issue link(s):
Summary - What I changed
Identifies when an AWS Systems Manager (SSM) command document is created by a user who does not typically perform this action. Adversaries may create SSM command documents to execute commands on managed instances, potentially leading to unauthorized access, command and control, data exfiltration and more.
This rule specifies that the document type is of command, which is how malicous scripts or commands can be executed on other compute instances regardless of VPC placement.
Run Command, a capability of AWS Systems Manager, uses Command documents to run commands. State Manager, a capability of AWS Systems Manager, uses command documents to apply a configuration. These actions can be run on one or more targets at any point during the lifecycle of an instance. Maintenance Windows, a capability of AWS Systems Manager, uses Command documents to apply a configuration based on the specified schedule.
How To Test
Checklist
bug,enhancement,schema,Rule: New,Rule: Deprecation,Rule: Tuning,Hunt: New, orHunt: Tuningso guidelines can be generatedmeta:rapid-mergelabel if planning to merge within 24 hoursContributor checklist